CVE-2004-0748

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.

References

http://www.redhat.com/support/errata/RHSA-2004-349.html

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=130750

http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml

http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096

http://www.novell.com/linux/security/advisories/2004_30_apache2.html

http://www.trustix.org/errata/2004/0047/

https://exchange.xforce.ibmcloud.com/vulnerabilities/17200

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11126

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2004-10-20

Updated: 2021-06-06

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
37076FreeBSD : apache2 -- SSL remote DoS (7b81fc47-239f-11d9-814e-0001020eed82)NessusFreeBSD Local Security Checks
medium
15898Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)NessusMacOS X Local Security Checks
high
15575FreeBSD : apache2 -- SSL remote DoS (16)NessusFreeBSD Local Security Checks
medium
14766GLSA-200409-21 : Apache 2, mod_dav: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
14752Mandrake Linux Security Advisory : apache2 (MDKSA-2004:096)NessusMandriva Local Security Checks
high
14748Apache 2.0.x < 2.0.51 Multiple Vulnerabilities (OF, DoS)NessusWeb Servers
medium
2292Apache < 2.0.51 IPv6 Remote Buffer OverflowNessus Network MonitorWeb Servers
medium
14667SUSE-SA:2004:030: apache2NessusSuSE Local Security Checks
medium
2254Apache < 2.0.51 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
14624RHEL 3 : httpd (RHSA-2004:349)NessusRed Hat Local Security Checks
medium
12293Apache 2.x < 2.0.50 Multiple Remote DoSNessusWeb Servers
medium
800564Apache < 2.0.51 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium